Stuxnet scored quick hit on first target, says researcher
Infected Iranian PC just 12 hours after worm's code was compiled, reports Symantec
Computerworld - Stuxnet infected its first target just 12 hours after hackers finished the worm, an indication that the malware scored an almost instant bulls-eye, a researcher said today.
The makers of Stuxnet launched the worm "as soon as they had it ready," Liam O Murchu, manager of operations of Symantec's security response team, said in an interview Monday.
"They knew where they wanted to deliver it, and to whom, and because that domain was targeted several different times, it shows they really wanted to get into [that target]," O Murchu added.
On Friday, Symantec published new information on Stuxnet, the worm that most suspect was aimed at Iran's nuclear program, including the uranium enrichment centrifuges at its underground Natanz facility.
In its newest Stuxnet analysis, Symantec said that 10 original infections in three waves over an 11-month period had targeted five domains linked to organizations within Iran. Symantec has declined to name the organizations, saying only that all five were involved in industrial processing.
As the worm spread, those 10 infected PCs later hijacked about 12,000 Iranian computers.
Symantec also compared each worm variant's compile time- and date-stamp -- when the attackers finished work on the malicious code -- with each version's first infection to track the speed with which Stuxnet did its damage.
It took the initial variant, compiled on June 22, 2009, just 12 hours to infect its first PC, said O Murchu, one of three Symantec experts who have spent months digging into the worm's code. The short interval means that the attackers planned carefully, he said, and had pinpointed their targets long before they had wrapped up their work.
Other targets in the first wave were infected six days, 14 days and 26 days after the worm code was compiled.
Previously, Symantec has said that one target of Stuxnet was the Natanz facility, where Iran houses thousands of high-speed centrifuges that can be used to enrich uranium into bomb-grade material. Within Stuxnet is code crafted to grab control of the high-speed electrical motors that spin centrifuges. According to Symantec, Stuxnet sabotages those centrifuges by speeding up and slowing down their motors.
Iranian officials have confirmed that the worm infected tens of thousands of the country's PCs, and have admitted that Stuxnet affected the operation of some of the centrifuges used to enrich uranium. The country has blamed Israel and the U.S. for the attacks.
Last month the New York Times, citing confidential sources, said that the worm was a joint American-Israeli project, and had been tested on Iranian-style centrifuges at the latter's secret nuclear facility at Dimona.
The average time between compilation and infection for all 10 initial attacks was 19 days, and the median was 26 days, said Symantec.
- New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on
- Needed: Breach detection correction
- Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief
- Cyberattacks could paralyze U.S., former defense chief warns
- Syrian Electronic Army shanghais Microsoft's Twitter account, blog
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!